SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2406.19091
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks. However, several SAT-resistant logic locking methods are reported; they require significant overhead. This paper proposes a novel input dependent key-based logic locking (IDKLL) that effectively prevents SAT-based attacks with low overhead. We first introduce a novel idea of IDKLL, where a design is locked such that it functions correctly for all input patterns only when their corresponding valid key sequences are applied. In contrast to conventional logic locking, the proposed IDKLL method uses multiple key sequences (instead of a single key sequence) as a valid key that provides correct functionality for all inputs. Further, we propose a sub-circuit replacement based IDKLL approach called SubLock that locks the design by replacing the original sub-circuitry with the corresponding IDKLL based locked circuit to prevent SAT attack with low overhead. The experimental evaluation on ISCAS benchmarks shows that the proposed SubLock mitigates the SAT attack with high security and reduced overhead over the well-known existing methods.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2406.19091
- https://arxiv.org/pdf/2406.19091
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4400141849
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4400141849Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2406.19091Digital Object Identifier
- Title
-
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP ProtectionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-06-27Full publication date if available
- Authors
-
Vijaypal Singh Rathor, Munesh Singh, Kshira Sagar Sahoo, Saraju P. MohantyList of authors in order
- Landing page
-
https://arxiv.org/abs/2406.19091Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2406.19091Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2406.19091Direct OA link when available
- Concepts
-
Key (lock), Computer science, Computer securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4400141849 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2406.19091 |
| ids.doi | https://doi.org/10.48550/arxiv.2406.19091 |
| ids.openalex | https://openalex.org/W4400141849 |
| fwci | |
| type | preprint |
| title | SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9919000267982483 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T13182 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9765999913215637 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1703 |
| topics[2].subfield.display_name | Computational Theory and Mathematics |
| topics[2].display_name | Quantum-Dot Cellular Automata |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C26517878 |
| concepts[0].level | 2 |
| concepts[0].score | 0.69786536693573 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[0].display_name | Key (lock) |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.4906822443008423 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.1690286099910736 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| keywords[0].id | https://openalex.org/keywords/key |
| keywords[0].score | 0.69786536693573 |
| keywords[0].display_name | Key (lock) |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.4906822443008423 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.1690286099910736 |
| keywords[2].display_name | Computer security |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2406.19091 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2406.19091 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2406.19091 |
| locations[1].id | doi:10.48550/arxiv.2406.19091 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2406.19091 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5055127158 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0326-3282 |
| authorships[0].author.display_name | Vijaypal Singh Rathor |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Rathor, Vijaypal Singh |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5084225906 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-0699-7273 |
| authorships[1].author.display_name | Munesh Singh |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Singh, Munesh |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5049724493 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6435-5738 |
| authorships[2].author.display_name | Kshira Sagar Sahoo |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Sahoo, Kshira Sagar |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5070359867 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-2959-6541 |
| authorships[3].author.display_name | Saraju P. Mohanty |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Mohanty, Saraju P. |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2406.19091 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052, https://openalex.org/W2382290278, https://openalex.org/W4395014643 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2406.19091 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2406.19091 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2406.19091 |
| primary_location.id | pmh:oai:arXiv.org:2406.19091 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2406.19091 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2406.19091 |
| publication_date | 2024-06-27 |
| publication_year | 2024 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 25, 57, 76, 82, 120, 125, 138 |
| abstract_inverted_index.In | 104 |
| abstract_inverted_index.We | 73 |
| abstract_inverted_index.as | 124 |
| abstract_inverted_index.be | 24 |
| abstract_inverted_index.by | 150 |
| abstract_inverted_index.is | 84 |
| abstract_inverted_index.it | 88 |
| abstract_inverted_index.of | 79, 119 |
| abstract_inverted_index.on | 172 |
| abstract_inverted_index.to | 23, 39, 106, 162 |
| abstract_inverted_index.we | 136 |
| abstract_inverted_index.SAT | 164, 182 |
| abstract_inverted_index.The | 32, 169 |
| abstract_inverted_index.all | 92, 133 |
| abstract_inverted_index.and | 7, 187 |
| abstract_inverted_index.are | 10, 37, 48, 102 |
| abstract_inverted_index.for | 28, 91, 132 |
| abstract_inverted_index.has | 21 |
| abstract_inverted_index.key | 100, 116, 122, 127 |
| abstract_inverted_index.low | 71, 167 |
| abstract_inverted_index.the | 110, 148, 152, 156, 177, 181, 191 |
| abstract_inverted_index.(IC) | 17 |
| abstract_inverted_index.(IP) | 2 |
| abstract_inverted_index.This | 54 |
| abstract_inverted_index.high | 185 |
| abstract_inverted_index.idea | 78 |
| abstract_inverted_index.only | 95 |
| abstract_inverted_index.over | 190 |
| abstract_inverted_index.such | 86 |
| abstract_inverted_index.that | 65, 87, 128, 146, 176 |
| abstract_inverted_index.they | 50 |
| abstract_inverted_index.uses | 114 |
| abstract_inverted_index.when | 96 |
| abstract_inverted_index.with | 70, 155, 166, 184 |
| abstract_inverted_index.IDKLL | 112, 142, 158 |
| abstract_inverted_index.ISCAS | 173 |
| abstract_inverted_index.Logic | 19 |
| abstract_inverted_index.based | 141, 159 |
| abstract_inverted_index.first | 74 |
| abstract_inverted_index.input | 59, 93 |
| abstract_inverted_index.locks | 147 |
| abstract_inverted_index.logic | 34, 45, 62, 108 |
| abstract_inverted_index.novel | 58, 77 |
| abstract_inverted_index.paper | 55 |
| abstract_inverted_index.shows | 175 |
| abstract_inverted_index.solid | 26 |
| abstract_inverted_index.their | 97 |
| abstract_inverted_index.these | 30 |
| abstract_inverted_index.valid | 99, 126 |
| abstract_inverted_index.where | 81 |
| abstract_inverted_index.IDKLL, | 80 |
| abstract_inverted_index.Trojan | 9 |
| abstract_inverted_index.attack | 165, 183 |
| abstract_inverted_index.called | 144 |
| abstract_inverted_index.design | 83, 149 |
| abstract_inverted_index.during | 14 |
| abstract_inverted_index.locked | 85, 160 |
| abstract_inverted_index.method | 113 |
| abstract_inverted_index.proven | 22 |
| abstract_inverted_index.single | 121 |
| abstract_inverted_index.(IDKLL) | 64 |
| abstract_inverted_index.SubLock | 145, 179 |
| abstract_inverted_index.attacks | 69 |
| abstract_inverted_index.circuit | 16, 161 |
| abstract_inverted_index.correct | 130 |
| abstract_inverted_index.defence | 27 |
| abstract_inverted_index.inputs. | 134 |
| abstract_inverted_index.locking | 20, 35, 46, 63 |
| abstract_inverted_index.methods | 47 |
| abstract_inverted_index.piracy, | 3 |
| abstract_inverted_index.prevent | 163 |
| abstract_inverted_index.propose | 137 |
| abstract_inverted_index.reduced | 188 |
| abstract_inverted_index.require | 51 |
| abstract_inverted_index.reverse | 5 |
| abstract_inverted_index.serious | 11 |
| abstract_inverted_index.several | 43 |
| abstract_inverted_index.(instead | 118 |
| abstract_inverted_index.Further, | 135 |
| abstract_inverted_index.However, | 42 |
| abstract_inverted_index.Property | 1 |
| abstract_inverted_index.applied. | 103 |
| abstract_inverted_index.approach | 143 |
| abstract_inverted_index.attacks. | 41 |
| abstract_inverted_index.concerns | 13 |
| abstract_inverted_index.contrast | 105 |
| abstract_inverted_index.existing | 33, 193 |
| abstract_inverted_index.hardware | 8 |
| abstract_inverted_index.locking, | 109 |
| abstract_inverted_index.methods. | 194 |
| abstract_inverted_index.multiple | 115 |
| abstract_inverted_index.original | 153 |
| abstract_inverted_index.overhead | 189 |
| abstract_inverted_index.patterns | 94 |
| abstract_inverted_index.prevents | 67 |
| abstract_inverted_index.proposed | 111, 178 |
| abstract_inverted_index.proposes | 56 |
| abstract_inverted_index.provides | 129 |
| abstract_inverted_index.security | 12, 186 |
| abstract_inverted_index.threats. | 31 |
| abstract_inverted_index.SAT-based | 40, 68 |
| abstract_inverted_index.correctly | 90 |
| abstract_inverted_index.dependent | 60 |
| abstract_inverted_index.functions | 89 |
| abstract_inverted_index.introduce | 75 |
| abstract_inverted_index.key-based | 61 |
| abstract_inverted_index.mitigates | 180 |
| abstract_inverted_index.overhead. | 53, 72, 168 |
| abstract_inverted_index.replacing | 151 |
| abstract_inverted_index.reported; | 49 |
| abstract_inverted_index.sequence) | 123 |
| abstract_inverted_index.sequences | 101, 117 |
| abstract_inverted_index.benchmarks | 174 |
| abstract_inverted_index.evaluation | 171 |
| abstract_inverted_index.integrated | 15 |
| abstract_inverted_index.mitigating | 29 |
| abstract_inverted_index.techniques | 36 |
| abstract_inverted_index.vulnerable | 38 |
| abstract_inverted_index.well-known | 192 |
| abstract_inverted_index.effectively | 66 |
| abstract_inverted_index.replacement | 140 |
| abstract_inverted_index.significant | 52 |
| abstract_inverted_index.sub-circuit | 139 |
| abstract_inverted_index.Intellectual | 0 |
| abstract_inverted_index.conventional | 107 |
| abstract_inverted_index.development. | 18 |
| abstract_inverted_index.engineering, | 6 |
| abstract_inverted_index.experimental | 170 |
| abstract_inverted_index.SAT-resistant | 44 |
| abstract_inverted_index.corresponding | 98, 157 |
| abstract_inverted_index.functionality | 131 |
| abstract_inverted_index.overbuilding, | 4 |
| abstract_inverted_index.sub-circuitry | 154 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |